Re: no real use case ?
The use case is for forming a chain of authenticity and verifiability, i.e., trust. Take Iota, which uses a Winternitz signature. The data is validated by peers, so instead of a monolithic chain of trust, the chain is distributed throughout the cluster.
The question is how does a document go from mortgage papers to being digitally verified. No, the hash is not the document. The document has to be stored some other place, and its hash is put in the system.